Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.211.132.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;55.211.132.104.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041600 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 15:52:21 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 104.132.211.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 104.132.211.55.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
188.168.82.246 attackspam
2020-07-17T21:15:48.567587lavrinenko.info sshd[21996]: Invalid user admin from 188.168.82.246 port 50772
2020-07-17T21:15:48.574177lavrinenko.info sshd[21996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.168.82.246
2020-07-17T21:15:48.567587lavrinenko.info sshd[21996]: Invalid user admin from 188.168.82.246 port 50772
2020-07-17T21:15:50.214026lavrinenko.info sshd[21996]: Failed password for invalid user admin from 188.168.82.246 port 50772 ssh2
2020-07-17T21:20:15.649454lavrinenko.info sshd[22055]: Invalid user kafka from 188.168.82.246 port 37398
...
2020-07-18 02:34:51
167.99.157.37 attack
(sshd) Failed SSH login from 167.99.157.37 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 17 13:54:44 localhost sshd[12427]: Invalid user ubuntu from 167.99.157.37 port 51296
Jul 17 13:54:45 localhost sshd[12427]: Failed password for invalid user ubuntu from 167.99.157.37 port 51296 ssh2
Jul 17 14:06:53 localhost sshd[13272]: Invalid user cumulus from 167.99.157.37 port 35456
Jul 17 14:06:56 localhost sshd[13272]: Failed password for invalid user cumulus from 167.99.157.37 port 35456 ssh2
Jul 17 14:12:42 localhost sshd[13631]: Invalid user wildfly from 167.99.157.37 port 53194
2020-07-18 02:38:50
159.89.136.78 attackbots
Unauthorised access (Jul 17) SRC=159.89.136.78 LEN=40 TTL=238 ID=11577 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jul 12) SRC=159.89.136.78 LEN=40 TTL=238 ID=1462 TCP DPT=3389 WINDOW=1024 SYN
2020-07-18 02:35:19
149.248.101.71 attack
Jul 17 15:09:20 server2 sshd\[15946\]: Invalid user admin from 149.248.101.71
Jul 17 15:09:21 server2 sshd\[15948\]: Invalid user admin from 149.248.101.71
Jul 17 15:09:22 server2 sshd\[15950\]: Invalid user admin from 149.248.101.71
Jul 17 15:09:23 server2 sshd\[15954\]: Invalid user admin from 149.248.101.71
Jul 17 15:09:25 server2 sshd\[15958\]: Invalid user admin from 149.248.101.71
Jul 17 15:09:26 server2 sshd\[15962\]: Invalid user admin from 149.248.101.71
2020-07-18 02:51:00
106.13.64.132 attackspam
(sshd) Failed SSH login from 106.13.64.132 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 17 20:52:35 srv sshd[3756]: Invalid user b from 106.13.64.132 port 32996
Jul 17 20:52:37 srv sshd[3756]: Failed password for invalid user b from 106.13.64.132 port 32996 ssh2
Jul 17 21:01:01 srv sshd[3876]: Invalid user laureen from 106.13.64.132 port 60954
Jul 17 21:01:04 srv sshd[3876]: Failed password for invalid user laureen from 106.13.64.132 port 60954 ssh2
Jul 17 21:03:34 srv sshd[3921]: Invalid user giovanna from 106.13.64.132 port 33040
2020-07-18 02:59:07
59.149.68.33 attack
Failed password for invalid user rstudio from 59.149.68.33 port 50464 ssh2
2020-07-18 02:38:06
167.71.118.16 attackbots
167.71.118.16 - - [17/Jul/2020:16:15:34 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.118.16 - - [17/Jul/2020:16:15:36 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.118.16 - - [17/Jul/2020:16:15:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-18 02:41:55
119.44.20.30 attack
Jul 17 15:46:22 jumpserver sshd[105454]: Invalid user ftp from 119.44.20.30 port 63289
Jul 17 15:46:24 jumpserver sshd[105454]: Failed password for invalid user ftp from 119.44.20.30 port 63289 ssh2
Jul 17 15:53:13 jumpserver sshd[105532]: Invalid user biable from 119.44.20.30 port 32873
...
2020-07-18 02:59:52
167.71.237.144 attackspam
Jul 17 20:59:41 rancher-0 sshd[416276]: Invalid user agfa from 167.71.237.144 port 58770
Jul 17 20:59:43 rancher-0 sshd[416276]: Failed password for invalid user agfa from 167.71.237.144 port 58770 ssh2
...
2020-07-18 03:02:23
94.102.51.28 attackspambots
[MK-VM3] Blocked by UFW
2020-07-18 03:00:10
31.220.2.133 attack
CMS (WordPress or Joomla) login attempt.
2020-07-18 02:48:48
221.200.166.38 attack
SSH Brute-Force. Ports scanning.
2020-07-18 03:05:37
149.56.129.68 attack
$f2bV_matches
2020-07-18 02:42:25
125.220.213.225 attack
Invalid user sec from 125.220.213.225 port 52312
2020-07-18 02:50:30
88.248.105.86 attackbotsspam
Automatic report - Port Scan Attack
2020-07-18 02:52:49

Recently Reported IPs

106.111.118.85 77.42.91.228 242.105.123.223 209.141.38.103
120.124.155.72 50.28.117.99 226.225.209.167 122.183.32.71
1.65.8.178 29.33.160.237 48.90.223.74 125.227.55.120
19.127.6.167 188.164.220.11 183.187.127.121 171.247.195.40
244.156.11.55 70.15.172.12 74.125.250.69 5.166.28.29